On the equivalence of authentication codes and robust (2, 2)-threshold schemes

2Citations
Citations of this article
14Readers
Mendeley users who have this article in their library.

Abstract

In this paper, we show a "direct"equivalence between certain authentication codes and robust threshold schemes. It was previously known that authentication codes and robust threshold schemes are closely related to similar types of designs, but direct equivalences had not been considered in the literature. Our new equivalences motivate the consideration of a certain "key-substitution attack."We study this attack and analyze it in the setting of "dual authentication codes."We also show how this viewpoint provides a nice way to prove properties and generalizations of some known constructions.

References Powered by Scopus

How to share a secret with cheaters

331Citations
N/AReaders
Get full text

Authentication Theory/Coding Theory

300Citations
N/AReaders
Get full text

Detection of algebraic manipulation with applications to robust secret sharing and fuzzy extractors

202Citations
N/AReaders
Get full text

Cited by Powered by Scopus

SPLITTING AUTHENTICATION CODES WITH PERFECT SECRECY: NEW RESULTS, CONSTRUCTIONS AND CONNECTIONS WITH ALGEBRAIC MANIPULATION DETECTION CODES

2Citations
N/AReaders
Get full text

Combinational constructions of splitting authentication codes with perfect secrecy

0Citations
N/AReaders
Get full text

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Cite

CITATION STYLE

APA

Paterson, M. B., & Stinson, D. R. (2021). On the equivalence of authentication codes and robust (2, 2)-threshold schemes. Journal of Mathematical Cryptology, 15(1), 179–196. https://doi.org/10.1515/jmc-2019-0048

Readers over time

‘20‘21‘22‘23‘2402468

Readers' Seniority

Tooltip

PhD / Post grad / Masters / Doc 5

71%

Researcher 2

29%

Readers' Discipline

Tooltip

Computer Science 5

71%

Physics and Astronomy 1

14%

Mathematics 1

14%

Save time finding and organizing research with Mendeley

Sign up for free
0